Lin Jiao

Orcid: 0000-0001-6394-6619

According to our database1, Lin Jiao authored at least 49 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ESA-Net: An efficient scale-aware network for small crop pest detection.
Expert Syst. Appl., February, 2024

Observer-Based Adaptive Finite-Time Neural Control for Constrained Nonlinear Systems With Actuator Saturation Compensation.
IEEE Trans. Instrum. Meas., 2024

2023
Observer-Based Adaptive Fuzzy Finite-Time Attitude Control for Quadrotor UAVs.
IEEE Trans. Aerosp. Electron. Syst., December, 2023

OSAF-Net: A one-stage anchor-free detector for small-target crop pest detection.
Appl. Intell., November, 2023

Spatial convolutional self-attention-based transformer module for strawberry disease identification under complex background.
Comput. Electron. Agric., September, 2023

An attention-based feature pyramid network for single-stage small object detection.
Multim. Tools Appl., May, 2023

Guess-and-determine attacks on SNOW-Vi stream cipher.
Des. Codes Cryptogr., May, 2023

An effective pest detection method with automatic data augmentation strategy in the agricultural field.
Signal Image Video Process., March, 2023

Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher.
IACR Trans. Symmetric Cryptol., 2023

An Underwater Image Restoration Method Based on Adaptive Brightness Improvement and Local Image Descattering.
IEEE Geosci. Remote. Sens. Lett., 2023

Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect.
IACR Cryptol. ePrint Arch., 2023

Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE.
IACR Cryptol. ePrint Arch., 2023

LOL: A Highly Flexible Framework for Designing Stream Ciphers.
IACR Cryptol. ePrint Arch., 2023

Key Filtering in Cube Attacks from the Implementation Aspect.
IACR Cryptol. ePrint Arch., 2023

Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

Deep Learning for Agricultural Visual Perception - Crop Pest and Disease Detection
Springer, ISBN: 978-981-99-4972-4, 2023

2022
Towards densely clustered tiny pest detection in the wild environment.
Neurocomputing, 2022

On the upper bound of squared correlation of SIMON-like functions and its applications.
IET Inf. Secur., 2022

Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers.
IACR Cryptol. ePrint Arch., 2022

Guess-and-Determine Attacks on AEGIS.
Comput. J., 2022

New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes.
Comput. J., 2022

Adaptive feature fusion pyramid network for multi-classes agricultural pest detection.
Comput. Electron. Agric., 2022

2021
A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers.
IEEE Trans. Inf. Theory, 2021

S-RPN: Sampling-balanced region proposal network for small crop pest detection.
Comput. Electron. Agric., 2021

CRA-Net: A channel recalibration feature pyramid network for detecting small pests.
Comput. Electron. Agric., 2021

FAN: A Lightweight Authenticated Cryptographic Algorithm.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Links between Division Property and Other Cube Attack Variants.
IACR Trans. Symmetric Cryptol., 2020

C-FCN: Corners-based fully convolutional network for visual object detection.
Multim. Tools Appl., 2020

RFP-Net: Receptive field-based proposal generation network for object detection.
Neurocomputing, 2020

Specifications and improvements of LPN solving algorithms.
IET Inf. Secur., 2020

Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version).
IACR Cryptol. ePrint Arch., 2020

A Guess-And-Determine Attack On SNOW-V Stream Cipher.
Comput. J., 2020

Stream cipher designs: a review.
Sci. China Inf. Sci., 2020

AF-RCNN: An anchor-free convolutional neural network for multi-categories agricultural pest detection.
Comput. Electron. Agric., 2020

Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IEEE Trans. Computers, 2019

A Depth-Adaptive Waveform Decomposition Method for Airborne LiDAR Bathymetry.
Sensors, 2019

Improved guess-and-determine attack on TRIVIUM.
IET Inf. Secur., 2019

2018
Guess-and-determine attacks on PANAMA-like stream ciphers.
IET Inf. Secur., 2018

Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18.
IACR Cryptol. ePrint Arch., 2018

VR Games and the Dissemination of Cultural Heritage.
Proceedings of the Distributed, Ambient and Pervasive Interactions: Understanding Humans, 2018

2016
Faster Algorithms for Solving LPN.
IACR Cryptol. ePrint Arch., 2016

2015
Two Generic Methods of Analyzing Stream Ciphers.
Proceedings of the Information Security - 18th International Conference, 2015

2014
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks.
Proceedings of the Information Security - 17th International Conference, 2014

2013
Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited.
Proceedings of the Information Security, 16th International Conference, 2013

2012
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2010
A Parallel Simulator for Large-Scale Parallel Computers.
Proceedings of the GCC 2010, 2010

2009
Research of Intelligent Rule-base Based on Multilayer Intrusion Detection.
J. Comput., 2009


  Loading...